Movatterモバイル変換


[0]ホーム

URL:


US12417451B2 - Authentication method secured by structural decoupling of personal and service identifiers - Google Patents

Authentication method secured by structural decoupling of personal and service identifiers

Info

Publication number
US12417451B2
US12417451B2US18/035,848US202118035848AUS12417451B2US 12417451 B2US12417451 B2US 12417451B2US 202118035848 AUS202118035848 AUS 202118035848AUS 12417451 B2US12417451 B2US 12417451B2
Authority
US
United States
Prior art keywords
identifier
computer
service
user
computers
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US18/035,848
Other versions
US20230410098A1 (en
Inventor
Daniel Krob
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
A3bc Group
Original Assignee
A3bc Group
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by A3bc GroupfiledCriticalA3bc Group
Publication of US20230410098A1publicationCriticalpatent/US20230410098A1/en
Assigned to A3BC GROUPreassignmentA3BC GROUPASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: KROB, DANIEL
Application grantedgrantedCritical
Publication of US12417451B2publicationCriticalpatent/US12417451B2/en
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method for enabling secure transactions without the physical support of a security identifier and, in particular, without a token, consisting in recording on a first computer device B a unique digital identifier IDi associated with a unique user Ui, the profile IDi being associated with at least one service identifier IDsi associated with a service Si registered on a second computer device S which is different from the first computer device B, the service Si being accessible by the user Ui, and, during a transaction, acquiring the digital identifier IDi of a user Ui, transmitting it to the first computer device B for comparison with the registered ID identifiers and searching for and activating on the computer device S, at least one service associated with the identifier of the user Ui. The new user registration step includes: when a central computer device receives a profile Pi, executing a step for generating a temporary random master key X; and when the central computer device receives an identifier IDi, executing a step of searching for the pair (IDi, IDRx) on the first computer device B and applying the inverse function FR-1 to the identifier IDRx to determine the key X.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS
This application is a U.S. national phase entry of PCT Patent Application Serial No. PCT/FR2021/051984, filed on Nov. 9, 2021, which claims priority to French Patent Application Serial No. FR2011468, filed on Nov. 9, 2020, both of which are incorporated by reference herein.
TECHNICAL FIELD
The present invention relates to the field of authenticating a user carrying out electronic transactions using a terminal connected to a computer device or to an access to a physical system. The security of transactions constitutes an essential issue and has given rise to numerous solutions making it possible to limit the risks of fraud as regards the author of the transaction or the nature of the transaction.
Biometric recognition techniques based on imaging systems coupled with a central database storing personal information constitute a path that faces detrimental limitations. Indeed, the biometric data may vary slightly. In order to take these variations into account, it has been provided to retain only a small part of the points considered as invariant. However, this results in:
    • The risk of false positives, i.e., the validation of biometric data whose invariant points are indeed identical or similar, but which actually come from two different persons. This has led to a person being arrested on the basis of fingerprints that were unusually close to those of an alleged murderer. This is also the case for the presentation of a fingerprint cast.
    • The risk of false negatives, i.e., the absence of validation of biometric data from a person, whose certain invariant points were masked, or modified by an artifact, for example the wearing of a mask.
The invention thus relates to the field of authentication excluding biometric data, and more specifically the field of electronic transactions activated by means of a reliable unique identifier such as for example a QrCode, an alphanumeric identifier, an email address, a unique identification number such as an IBAN or a social security number, and securing the process of registering the identifier, its storage and verification to reduce the risks in the event of computer attacks on a transaction system server.
BACKGROUND AND SUMMARY
The European patent application EP 1488359A4 is known, which relates to a method making it possible to perform an online transaction via a transaction manager. The method disclosed in the invention consists in generating a one-time use transaction request identification; the transaction manager linking this identification to banking information of a subscribed user; providing the transaction request identification to the subscribed user who makes a request to purchase a product or service having a certain value from a merchant. The purchase request consists in providing the transaction request identification to the merchant. The merchant sends a payment request to the transaction manager for a transfer of funds equal to the value from the user to the merchant, with the payment request comprising the transaction request identification and the value. The transaction manager verifies the validity of the transaction request identification, and then disables the reuse of this identification. If the transaction request identification is valid, an electronic funds transfer request is sent to a financial institution to enable the transfer of the collected value from the user to the merchant, with the electronic funds transfer request comprising the banking information.
European patent EP2839603B1 discloses a user authentication method comprising executing, by a processing system, the following operations:
    • receiving a request from a user to initiate an authentication session, the request comprising a unique identifier of the user,
    • accessing, by means of the unique identifier, to a registration memorized in a memory associated with the user, the memorized registration comprising at least code value complexity preference data that defines a user-preferred level of complexity intended for a user in validating a user input received in response to the presentation of security matrices, and a user-defined keyword consisting of an ordered sequence of symbols comprising members of a predetermined set of symbols selected from one or more sets of symbols supported by the processing system, wherein the symbols of the ordered sequence have been previously selected by the user independently of other user selections,
    • generating a one-time use security matrix that is valid only for the user during the authentication session, and that comprises a matching between each symbol within the set of predetermined symbols and a code value that is specific to the authentication session and randomly selected from a set of codes that is different from the set of predetermined symbols,
    • transmitting the one-time use security matrix for presentation purposes to the user, wherein the one-time use security matrix presented to the user comprises symbols from the set of predetermined symbols matching the code values randomly selected from the set of codes,
    • receiving an ordered sequence of code values selected from the one-time use security matrix and inputted by the user, based on the user-defined keyword and code value complexity preference data, in response to the presentation of the one-time use security matrix,
    • validating the received ordered sequence of code values by comparing it to a matching sequence of code values generated, but not transmitted, by the processing system based on the user-defined keyword in the memorized registration, the code value complexity preference data and the one-time use security matrix, and
    • generating an authentication result of the authentication session based on the comparison.
      Disadvantages
Background art solutions have a major technical problem because they leave open the possibilities of computer attacks. One of the sources of vulnerability lies in the management of identifiers. The knowledge of the identifier makes it possible to pass a first step of the authorization procedure to a service, the information being used for the following step which is the authentication of the user having transmitted—legally or fraudulently—a valid identifier. The security of the identifier depends on the measures taken by the user in order to preserve the secret character thereof, and where applicable on the electronic means provided on the physical medium of the identifier when it is recorded on a key, a card or a portable device such as a telephone.
The solutions of the background art have a second disadvantage that concerns the security of the authentic data recorded during the creation of a user's account. This data is generally recorded in a secured area DMZ of the computer device, but in the event of a computer attack, it is still possible to recover all of the data associated with the users' identifiers.
A third disadvantage lies in the risk of data interception and fraudulent reuse of this data. A fourth disadvantage lies in the risk of creating a false account for accessing the services of a third-party user. It is implicitly accepted that the identification is vulnerable and requires only little computation power on the user's device, insofar as security will result from be the robustness of the authentication and optionally certification protocol, requiring more powerful processing resources, pooled at the level of a computer device.
Solution
In order to remedy these disadvantages, the invention relates according to its most general meaning, to a method for enabling secure transactions of a security identifier and, in particular, without a token, consisting in recording on a first computer device B a unique digital identifier IDiassociated with a unique user Ui, said profile IDibeing associated with at least one service identifier IDsi associated with a service Si registered on a second computer device S which is different from the first computer device B, said service Sibeing accessible by the user Ui, and, during a transaction, acquiring the digital identifier IDiof a user Ui, transmitting it to the first computer device B for comparison with the registered ID identifiers and searching for and activating, on the computer device S, at least one service associated with the identifier of the user Ui, characterized, in that the new user registration step includes the following steps:
    • when a central computer device receives an identifier IDiand a service identifier IDsi, executing a step of generating a master key, characterized in that said master key is a temporary random key X,
    • then a step of generating a reference identifier IDRx, calculated by applying a non-reversible reference cryptographic function FR to said key, and of recording in a computer table the unique pair (IDi, IDRx) recorded on the computer device B,
    • and lastly a step of generating at least one reference identifier IDSEx, calculated by applying a non-reversible reference cryptographic function FSE different from function FR, to said temporary random key, and of recording in a computer table the unique pair (IDsi, IDSEx) recorded on a computer device S, in that the accomplishment of a transaction includes the following steps:
    • when said central computer device receives an identifier IDi, executing a step of searching for the pair (IDi, IDRx) on said first computer device B and applying the inverse function FR-1 to the identifier IDRx to determine the temporary random key,
    • and lastly the search for at least one service Sion a second computer device S by applying the function FSE to said temporary random key, in order to calculate the identifier IDSEx and obtain the identifier IDsiassociated with the service Si.
Advantageously, it further includes, when a central computer device receives an identifier IDi, a step of generating a reference identifier IDPEx calculated by the application of a non-reversible cryptographic function FPE, different from the reference functions FR and FSE, to said random key X and of recording in a computer table the pair (IDpi, IDPEx), wherein IDpiis an identifier of personal information Pi associated with the user Uiand accessible to the latter, stored on a third computer device P different from said first and second computer devices B and S, and when the transaction is being accomplished, the search for the personal information Pion said third computer device P by applying the function FPE to said temporary random key, in order to calculate the identifier IDPEx and obtain the identifier IPpiassociated with the personal information Pi.
The invention also relates to a set of computer devices for accomplishing secure transactions of a security identifier without a token, characterized in that said set of computer devices comprises a computer device making it possible to access a first computer device B and at least one second service computer device S, and a computer key device forming the support of said non-reversible functions. Preferably, the set further includes computer processing computer devices for accomplishing control, security and plausibility processing of information coming from user devices. The invention also includes a computer program for controlling the execution on a computer device the accomplishment of a secure transaction of a security identifier, without a token, characterized in that it consists of a code controlling the acquisition of a digital identifier coming from remote devices, the processing of said identifiers in accordance with the aforementioned method and the execution of the data exchange protocol between the remote devices and the computer device for the use thereof.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will be better understood on reading the following description, with reference to the appended drawings, in which:
FIG.1 depicts the hardware architecture of a computer device for the implementation of the invention,
FIG.2 depicts the block diagram of the invention,
FIG.3 depicts the data exchanges diagram for the procedure for a new user enrollment,
FIG.4 depicts the data exchanges diagram for the procedure for enrolling a user to a new service, and
FIG.5 depicts the data exchanges diagram for the procedure to access a service by an enrolled user.
DETAILED DESCRIPTION
Hardware Architecture
FIG.1 depicts a schematic diagram of the hardware architecture of a system for the implementation of the invention. The user has a unique identifier that can simply be memorized, or recorded on a peripheral device in the possession of the user and that is transferable to a control terminal by entering it on a keyboard or a touch screen, or by transmitting it from a memory via a physical link such as a connector or an optical link or by radio frequency.
The input and output computer device (0) receives the information flows from user devices, manages the queues, for the on-the-fly distribution on the processing computer device (1) and the returns to the input terminals or the transmission device of the identifier. This input and output device (0) also accomplishes control, security and plausibility processing, as well as transmission operations in order to verify that the transmitted information is indeed compliant. This involves especially checking whether the identifier of the terminal or the device transmitting the identifier (for example its IP address) is on a blacklisted terminal, or if the information has anomalies representative of attempted attacks, saturation or fraud.
The computer device (0) opens a transactional session to interact with the device (1) giving access to the devices (2 to4) in order to obtain user profiles, services and personal information and retroact with the device (0) in order to exchange with the involved user via a transactional session managed in synchronous or asynchronous mode. Regarding the computer devices (2 to4), they manage the consolidated access to the user profiles, services and personal information, by interacting with a computer key device (5) forming the support for the non-reversible functions implemented by the method according to the invention. The computer device (6) makes it possible to administer the entire system especially by keeping the trace of all transactions, in order to allow the audit of the transactions and in the event of a physical crash, the restoration of the transactions.
Functional Diagram of the Invention
FIG.2 depicts an example of a functional diagram,FIGS.3 to5 showing in more detail the information exchanges between the different computing resources implemented, respectively the procedure for a new user enrollment, the procedure for enrolling an enrolled user to a new service, and the procedure for requesting access to a service by an enrolled user.
New User Enrollment Procedure
The new user first proceeds to an enrollment via a computer device (0) as illustrated inFIG.3. He or she opens a session with the computer device (1) and transmits a digital file matching an enrollment request. This file contains an identifier, profile data, and personal data. It can be transmitted in an encrypted form.
The client accesses the service by means of a computer device (0), which comprises means for inputting or transmitting an identifier, for example a keyboard, a QrCode reader, a radiofrequency module, a connector to receive a peripheral device for recording the identifier or an application in charge of transmitting the identifier. This device (0) is connected to a network for opening a session with the system (100) which hosts the set of computer devices constituting the hardware architecture of the invention.
The first function (10) consists in retrieving, controlling and transmitting the information necessary for the transaction, in particular the digital identifier acquired by the computer device (0) as well as associated information (for example the geolocation of the terminal, the identifiers of the terminal or the application in charge of transmitting the identifier (IP address, different identifiers such as SIM card, etc.) or the time stamp), as well as information only on the nature of the transaction. This information comes from the identifier of the provider/terminal pair, for example when it is a terminal of a provider made available to users, or the identification of the service access application. The function (10) also opens a transactional session for each user.
Procedure for Enrolling a User to a New Service
The enrolled user, as explained previously, then proceeds to enroll to services via his or her computer device (0) as illustrated byFIG.4. He or she opens a session with the computer device (1) and transmits a digital file matching a service registration request. This file contains a service identifier, profile data, and personal data. It can be transmitted in an encrypted form.
This process (11) is integrated in a processing chain linked to a transactional session opened for each user by the function (10). For this purpose, each transactional session consists in transmitting, controlling and reconciling the user profiles, the service identifiers and the personal information provided by the function (11), and then obtaining the service selected by the client. This processing (11) is accomplished by the computer device (1), by interacting with the computer devices (2 to4) and (5). The system (100) also integrates administration functions and functions in charge of the traceability and security protocols.
Procedure for Requesting the Access of a User to a Service
The enrolled user, as explained previously, can then proceed to request access to previously enrolled services as illustrated byFIG.5. He or she opens a session with the computer device (1) and transmits a digital file matching a request to access the service. This file contains an identifier and profile data. It can be transmitted in an encrypted form.
This request is verified by the device (1) to verify whether the user is actually enrolled, and if the requested service is enrolled. If this is the case, it transmits the access request to the computer device (2) matching the requested service. This device (2) proceeds to extract the identifier IDRx from the identifier ID and executes a control of the profile recorded in the request. In the event of an erroneous control, the task stops by means of an interruption procedure and optionally a notification to the device (1) which transmits it to the user device (0). If the control is positive, the involved computer device (2) opens a session with the computer device (5) in order to obtain the public key KR and then proceeds to calculate the source value X from a decryption function F−1(KV,Y) as explained in more detail below. This source value thus calculated is controlled by device2 and transmitted to the device (1).
The device then proceeds to making a request to access the service (X) through a session with the device (4), which opens a session with the device (5) in order to transmit a request to access the key KSE. This key KSE is transmitted in response to the device (5), which then proceeds to calculate IDSEx=FR (KPE, X). From this information, the device (5) extracts the identifier IDSiand the service data to transmit them to the device (1) which transmits them via the initially opened session to the user device (0).
Protocols for the Creation of Identifiers and Identification
The following description presents in more detail the protocol for the creation of the identifiers, and then in the following part, the protocol for identification from a digital identifier presented to the system. One of the important goals of the invention is to guarantee data security natively integrated (“by design”) in its architecture due to the fact that the reference identifier of the digital identifier and the reference identifiers of the services are structurally different, their generation being managed by an algorithm based on a one-way cryptographic function so as to be able to perform reconciliations on-the-fly according to transactional needs. The proposed mechanism is based on the use of cryptographic protocols such as AES with keys of size greater than 128 bits, for example RSA with a 2048 bit key.
The operator of the system must select one-way cryptographic functions F for managing its exchanges with the information storage sources used. They will be called hereafter FR (for the reference function), FSE (for the access, storage and update of service information) and FP (for the access, storage and update of personal information). These functions will allow the computer devices (2 to4) to calculate in real time values Y=F(KQ,X) as a function of a source value X and using a public key KQ so that the knowledge of Y does not make it possible to automatically go back to X in an algorithmically realistic way (the reconstruction times of the source value X must be prohibitive in practice). To go back to X, it must be necessary to have a private key KV held secret, which makes it possible to reconstruct X=F−1(KV,Y) from Y by using a decryption function F−1.
The generation of reference identifiers, service identifiers and personal identifiers of a user Uiwill then be done according to the following protocol: The computer device (1) randomly draws a random value X for example using a hash function to statistically avoid collisions. The computer devices (2 to4) interact with the computer device (5) to obtain the public keys KR, KPE and KSE to manage respectively the exchanges involving the identification information, the services and the personal information.
The computer devices (2 to5) fabricate the reference identifier IDR and at least one service identifier IDSE, as well as a personal information identifier IDPE, where appropriate, according to the following simple rules (in the event of collision with an existing identifier, a new value X will be generated):
IDR=FR(KR,X),
IDPE=FPE(KPE,X)
IDSE=FSE(KSE,X).
In this way, the identifiers are indeed linked through X, which makes it possible to reconstitute an identifier from the reference identifier using the private cryptographic key that allows the decryption of the reference identifier and thus to reconstitute the random value X from their knowledge. The client services and the personal information, where appropriate, belonging to a given physical person, recognized by means of his or her digital identifier, will thus be reconstituted.

Claims (3)

The invention claimed is:
1. An authentication method for a secure transaction of a security identifier, without a token, including a new user registration step comprising:
recording on a first computer a profile associated with a single user, the profile being associated with at least one service identifier associated with a service, registered on a second computer different from the first computer, the service being accessible by the user,
when a central computer receives an identifier and a service identifier, executing a step of generating a master key,
and, during a transaction, proceeding with a step of opening a session on a network comprising the first computer and a host system which hosts a set of computers comprising giving access to the computers in order to obtain the user profiles, services and personal information and retroact with the computers as well as a computer key interacting with the computers to provide public keys and to manage respectively exchanges involving the identification information, the services and the personal information;
retrieving, controlling and transmitting the information necessary for the transaction, including the digital identifier acquired by the first computer as well as the associated information,
transmitting, controlling and reconciling the user profiles, the service identifiers and the personal information provided by a function, and then obtaining the service selected by a client by proceeding with the acquisition of the profile of the user to transmit it to the first computer for comparison with the recorded identifiers and to search for and activate, on the computers, at least one service associated with the user identifier,
the new user registration step comprising:
when the central computer receives an identifier and a service identifier, executing the step of generating the master key,
wherein the master key is a temporary random key,
then generating a reference identifier, calculated by applying a non-reversible reference cryptographic function to the temporary random key, and recording in a computer table the unique pair of the identifiers (IDi, IDRx) recorded on the computer, and
generating at least one service identifier, calculated by applying a non-reversible reference cryptographic function different from the function, to the temporary random key, and recording in a computer table the unique pair of the identifiers recorded on the computers.
2. The authentication method for a secure transaction of a security identifier according toclaim 1, further comprising, when the central computer receives an identifier, generating a reference identifier calculated by a non-reversible cryptographic function, different from the reference functions, to the random key and recording in a computer table the identification pair, wherein an identifier of personal information associated with the user and accessible to the latter, is stored on a third computer different from the first and second computers, and when the transaction is being accomplished, the search for the personal information on the third computer by applying the function to the key, in order to calculate the identifier and obtain the identifier associated with the personal information.
3. A set of computer devices for accomplishing secure transactions of a security identifier without a token, wherein the set of computer devices comprises:
(a) input computers configured to receive information flows coming from user terminals, executing and finalizing the transactions new user registration instructions comprising:
when a central of the computers receives an identifier and a service identifier, generating a master key which is a temporary random key,
then, generating a reference identifier calculated by applying a non-reversible reference cryptographic function to the temporary random key, and recording in a computer table unique identifiers recorded on one of the computers,
thereafter, generating at least one service identifier, calculated by applying a non-reversible reference cryptographic function different from the function, to the temporary random key, and recording the unique identifiers recorded on the computers; and
(b) the computers comprising a third computer interfacing to a first computer and to at least a second service computer, and the computers forming support of the non-reversible functions.
US18/035,8482020-11-092021-11-09Authentication method secured by structural decoupling of personal and service identifiersActive2042-01-03US12417451B2 (en)

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
FR20114682020-11-09
FRFR20114682020-11-09
FR2011468AFR3116132A1 (en)2020-11-092020-11-09 SECURE AUTHENTICATION PROCESS BY STRUCTURAL DECOUPLING OF PERSONAL IDENTIFIERS AND SERVICES
PCT/FR2021/051984WO2022096841A1 (en)2020-11-092021-11-09Authentication method secured by structural decoupling of personal and service identifiers

Publications (2)

Publication NumberPublication Date
US20230410098A1 US20230410098A1 (en)2023-12-21
US12417451B2true US12417451B2 (en)2025-09-16

Family

ID=75746680

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US18/035,848Active2042-01-03US12417451B2 (en)2020-11-092021-11-09Authentication method secured by structural decoupling of personal and service identifiers

Country Status (4)

CountryLink
US (1)US12417451B2 (en)
EP (1)EP4241190A1 (en)
FR (1)FR3116132A1 (en)
WO (1)WO2022096841A1 (en)

Citations (33)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5764789A (en)1994-11-281998-06-09Smarttouch, LlcTokenless biometric ATM access system
US6154879A (en)1994-11-282000-11-28Smarttouch, Inc.Tokenless biometric ATM access system
WO2001027723A1 (en)1999-10-082001-04-19Hewlett-Packard CompanyTrusted computing platform with biometric authentication
US20020049662A1 (en)*2000-05-102002-04-25Takuya OshimaElectronic settlement system, settlement management device, store device, client device, data storage device, computer program, and storage medium
US20020167935A1 (en)*2001-03-052002-11-14Nabkel Jafar S.Method and system for dynamic service profile integration by a service controller
US20020196741A1 (en)*2001-04-252002-12-26Jaramillo Paul DanielMethod and system for event and message registration by an association controller
US20030158960A1 (en)*2000-05-222003-08-21Engberg Stephan J.System and method for establishing a privacy communication path
US20040133781A1 (en)*2001-03-122004-07-08Louis GuillouCryptographic authentication with ephemeral modules
EP1488359A1 (en)2002-03-042004-12-22Creative On-line Technologies LimitedElectronic transfer system
US20060212407A1 (en)*2005-03-172006-09-21Lyon Dennis BUser authentication and secure transaction system
WO2006111205A1 (en)2005-04-222006-10-26Daon Holdings LimitedA system and method for protecting the privacy and security of stored biometric data
US20070106892A1 (en)*2003-10-082007-05-10Engberg Stephan JMethod and system for establishing a communication using privacy enhancing techniques
US20080195664A1 (en)*2006-12-132008-08-14Quickplay Media Inc.Automated Content Tag Processing for Mobile Media
US20090281949A1 (en)*2008-05-122009-11-12Appsware Wireless, LlcMethod and system for securing a payment transaction
US20090282260A1 (en)*2001-06-182009-11-12Oliver TattanElectronic data vault providing biometrically protected electronic signatures
WO2011041916A1 (en)*2009-10-092011-04-14Quickplay Media Inc.Digital rights management in a mobile environment
US20110161233A1 (en)*2009-12-302011-06-30First Data CorporationSecure transaction management
US20110225417A1 (en)*2006-12-132011-09-15Kavi MaharajhDigital rights management in a mobile environment
US20130212666A1 (en)*2012-02-102013-08-15Ulf MattssonTokenization in mobile environments
US20140304505A1 (en)*2013-03-152014-10-09William Johnson DawsonAbstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation
FR3033205A1 (en)2015-02-272016-09-02Daniel Krob METHOD OF TRANSACTING WITHOUT PHYSICAL SUPPORT OF A SECURITY IDENTIFIER AND WITHOUT TOKEN, SECURED BY STRUCTURAL DECOUPLING OF PERSONAL AND SERVICE IDENTIFIERS.
US20170017957A1 (en)*2015-07-172017-01-19Mastercard International IncorporatedAuthentication system and method for server-based payments
US20170064390A1 (en)*2015-08-312017-03-02Nagravision S.A.Automatically loading user profile to show recently watched channels
WO2018038384A1 (en)*2016-08-262018-03-01삼성전자 주식회사Server apparatus and method for controlling same
WO2018177143A1 (en)*2017-03-312018-10-04华为技术有限公司Identity authentication method and system, server and terminal
US20190220852A1 (en)*2018-01-172019-07-18Medici Ventures, Inc.Multi-approval system using m of n keys to restore a customer wallet
EP2839603B1 (en)2010-11-302019-10-23Forticode LtdAbstracted and randomized one-time passwords for transactional authentication
US10499107B1 (en)*2018-11-272019-12-03Tp Vision Holding B.V.Television system and method for controlling the television system
US20200084575A1 (en)*2016-10-032020-03-12J2B2, LlcSystems and methods for identifying parties based on coordinating identifiers
US11144915B2 (en)*2018-10-022021-10-12Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards using risk factors
US11178143B2 (en)*2015-10-142021-11-16Banma Zhixing Network (Hongkong) Co., LimitedSystem, method and apparatus for device authentication
US11589094B2 (en)*2019-07-222023-02-21At&T Intellectual Property I, L.P.System and method for recommending media content based on actual viewers
US11824643B2 (en)*2018-12-062023-11-21Convida Wireless, LlcSecurity lifecycle management of devices in a communications network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
FR2962571B1 (en)2010-07-082012-08-17Inside Contactless METHOD FOR PERFORMING A SECURE APPLICATION IN AN NFC DEVICE

Patent Citations (43)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6154879A (en)1994-11-282000-11-28Smarttouch, Inc.Tokenless biometric ATM access system
US5764789A (en)1994-11-281998-06-09Smarttouch, LlcTokenless biometric ATM access system
WO2001027723A1 (en)1999-10-082001-04-19Hewlett-Packard CompanyTrusted computing platform with biometric authentication
US20020049662A1 (en)*2000-05-102002-04-25Takuya OshimaElectronic settlement system, settlement management device, store device, client device, data storage device, computer program, and storage medium
US7054845B2 (en)*2000-05-102006-05-30Sony CorporationElectronic settlement system, settlement management device, store device, client device, data storage device, computer program, and storage medium
US20030158960A1 (en)*2000-05-222003-08-21Engberg Stephan J.System and method for establishing a privacy communication path
US7027408B2 (en)*2001-03-052006-04-11Qwest Communications International, IncMethod and system for dynamic service profile integration by a service controller
US20020167935A1 (en)*2001-03-052002-11-14Nabkel Jafar S.Method and system for dynamic service profile integration by a service controller
US7415614B2 (en)*2001-03-122008-08-19France TelecomCryptographic authentication with ephemeral modules
US20040133781A1 (en)*2001-03-122004-07-08Louis GuillouCryptographic authentication with ephemeral modules
US20020196741A1 (en)*2001-04-252002-12-26Jaramillo Paul DanielMethod and system for event and message registration by an association controller
US20090282260A1 (en)*2001-06-182009-11-12Oliver TattanElectronic data vault providing biometrically protected electronic signatures
EP1488359A4 (en)2002-03-042009-11-04Creative On Line TechnologiesElectronic transfer system
EP1488359A1 (en)2002-03-042004-12-22Creative On-line Technologies LimitedElectronic transfer system
US20070106892A1 (en)*2003-10-082007-05-10Engberg Stephan JMethod and system for establishing a communication using privacy enhancing techniques
US20060212407A1 (en)*2005-03-172006-09-21Lyon Dennis BUser authentication and secure transaction system
WO2006111205A1 (en)2005-04-222006-10-26Daon Holdings LimitedA system and method for protecting the privacy and security of stored biometric data
US9124650B2 (en)*2006-12-132015-09-01Quickplay Media Inc.Digital rights management in a mobile environment
US20080195664A1 (en)*2006-12-132008-08-14Quickplay Media Inc.Automated Content Tag Processing for Mobile Media
US20110225417A1 (en)*2006-12-132011-09-15Kavi MaharajhDigital rights management in a mobile environment
US8219134B2 (en)*2006-12-132012-07-10Quickplay Media Inc.Seamlessly switching among unicast, multicast, and broadcast mobile media content
US20090281949A1 (en)*2008-05-122009-11-12Appsware Wireless, LlcMethod and system for securing a payment transaction
WO2011041916A1 (en)*2009-10-092011-04-14Quickplay Media Inc.Digital rights management in a mobile environment
US20110161233A1 (en)*2009-12-302011-06-30First Data CorporationSecure transaction management
EP2839603B1 (en)2010-11-302019-10-23Forticode LtdAbstracted and randomized one-time passwords for transactional authentication
US20130212666A1 (en)*2012-02-102013-08-15Ulf MattssonTokenization in mobile environments
US20140304505A1 (en)*2013-03-152014-10-09William Johnson DawsonAbstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation
US9141823B2 (en)*2013-03-152015-09-22Veridicom, Sa De CvAbstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation
FR3033205A1 (en)2015-02-272016-09-02Daniel Krob METHOD OF TRANSACTING WITHOUT PHYSICAL SUPPORT OF A SECURITY IDENTIFIER AND WITHOUT TOKEN, SECURED BY STRUCTURAL DECOUPLING OF PERSONAL AND SERVICE IDENTIFIERS.
US20200143382A1 (en)2015-02-272020-05-07A3Bc IpMethod of transaction without physical support of a security identifier and without token, secured by the structural decoupling of the personal and service identifiers
US20170017957A1 (en)*2015-07-172017-01-19Mastercard International IncorporatedAuthentication system and method for server-based payments
US20170064390A1 (en)*2015-08-312017-03-02Nagravision S.A.Automatically loading user profile to show recently watched channels
US9729925B2 (en)*2015-08-312017-08-08Opentv, Inc.Automatically loading user profile to show recently watched channels
US11178143B2 (en)*2015-10-142021-11-16Banma Zhixing Network (Hongkong) Co., LimitedSystem, method and apparatus for device authentication
WO2018038384A1 (en)*2016-08-262018-03-01삼성전자 주식회사Server apparatus and method for controlling same
US20200084575A1 (en)*2016-10-032020-03-12J2B2, LlcSystems and methods for identifying parties based on coordinating identifiers
US11070943B2 (en)*2016-10-032021-07-20J2B2, LlcSystems and methods for identifying parties based on coordinating identifiers
WO2018177143A1 (en)*2017-03-312018-10-04华为技术有限公司Identity authentication method and system, server and terminal
US20190220852A1 (en)*2018-01-172019-07-18Medici Ventures, Inc.Multi-approval system using m of n keys to restore a customer wallet
US11144915B2 (en)*2018-10-022021-10-12Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards using risk factors
US10499107B1 (en)*2018-11-272019-12-03Tp Vision Holding B.V.Television system and method for controlling the television system
US11824643B2 (en)*2018-12-062023-11-21Convida Wireless, LlcSecurity lifecycle management of devices in a communications network
US11589094B2 (en)*2019-07-222023-02-21At&T Intellectual Property I, L.P.System and method for recommending media content based on actual viewers

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
⋅ Elaine Barker. "Recommendation for Key Management: Part 1."(May 2020). Retrieved online Oct. 31, 2024. https://nistpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-57pt1r5.pdf (Year: 2020)*
⋅ Oasis. "Key Management Interoperability Protocol Specification Version 1.3." (Dec. 27, 2016). Retrieved online Oct. 31, 2024. https://docs.oasis-open.org/kmip/spec/v1.3/kmip-spec-v1.3.html (Year: 2016)*
⋅ Pingldentity. "Cryptographic Keys."(Aug, 12, 2020). Retrieved online Oct 31, 2024. https://backstage.forgerock.com/docs/ds/7.1/security-guide/pki.html (Year: 2020)*
International Search Report for International Patent Application No. PCT/FR2021/051984, dated Feb. 9, 2022 (in French and English).
Jiang, Peng et al., "An anonymous and efficient remote biometrics user authentication scheme in a multi server environment," Frontiers of Computer Science, Springer Berlin Heidelberg, Berlin/Heidelberg, vol. 9, No. 1, Dec. 29, 2014, pp. 142-156.
U.S. Appl. No. 15/553,728, filed Aug. 25, 2017, Daniel Krob.

Also Published As

Publication numberPublication date
WO2022096841A1 (en)2022-05-12
EP4241190A1 (en)2023-09-13
FR3116132A1 (en)2022-05-13
US20230410098A1 (en)2023-12-21

Similar Documents

PublicationPublication DateTitle
KR102052036B1 (en)Method for obtaining data through searching and merging distributed data stored using blockchain
US6928546B1 (en)Identity verification method using a central biometric authority
US7246244B2 (en)Identity verification method using a central biometric authority
US8079082B2 (en)Verification of software application authenticity
CN117579281A (en)Method and system for ownership verification using blockchain
US20180241558A1 (en)1:n biometric authentication, encryption, signature system
US20090172402A1 (en)Multi-factor authentication and certification system for electronic transactions
CN108027926A (en)The Verification System and method of payment based on service
JP2003534589A (en) Authentication system and method
US20250132919A1 (en)Decentralized zero-trust identity verification-authentication system and method
US20230006844A1 (en)Dynamic value appended to cookie data for fraud detection and step-up authentication
CN109741800A (en) Security protection method for internal and external network interaction of medical data based on blockchain technology
US20160012399A1 (en)Secure two-stage transactions
KR20040082674A (en)System and Method for Authenticating a Living Body Doubly
CN101425901A (en)Control method and device for customer identity verification in processing terminals
US10990978B2 (en)Method of transaction without physical support of a security identifier and without token, secured by the structural decoupling of the personal and service identifiers
CN109743322A (en) Identity authentication method, identity authentication system
CN111937023A (en)Security authentication system and method
JP2000078128A (en) Communication system, IC card, and recording medium
US20240127242A1 (en)Methods and systems for processing customer-initiated payment transactions
US12417451B2 (en)Authentication method secured by structural decoupling of personal and service identifiers
JP2001331646A (en)System and method for financial transaction using fingerprint matching
CN120770137A (en) Biometric integrated coin
Kaur et al.Fingerprint-Based Multifactor Authentication For Bank Transaction
Deswarte et al.A Proposal for a Privacy-preserving National Identity Card.

Legal Events

DateCodeTitleDescription
FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

ASAssignment

Owner name:A3BC GROUP, FRANCE

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KROB, DANIEL;REEL/FRAME:070770/0574

Effective date:20240423

STPPInformation on status: patent application and granting procedure in general

Free format text:PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCFInformation on status: patent grant

Free format text:PATENTED CASE


[8]ページ先頭

©2009-2025 Movatter.jp